The epidemiology of lateral movement: exposures and countermeasures with network contagion models

03/18/2019
by   Brian A. Powell, et al.
0

An approach is developed for analyzing computer networks to identify systems and accounts that are at particular risk of compromise by an adversary seeking to move laterally through the network via authentication. The dynamics of the adversary are modeled as a contagion spreading across systems linked via authentication relationships derived from Administrator account access and active session data. The adversary is assumed to traverse the network via credential chaining, where the adversary steals credentials from one system, uses them to authenticate to another, and repeats the process. Graph topology measures are used to analyze different contagion models applied to a real Windows network for three primary exposures by identifying: accounts which, either individually or collectively, provide wide and far-reaching access to many systems across the network; accounts with notable privilege escalation liability; and "gatekeeper" systems through which the adversary must pass in order to reach critical assets. The approach can be used to test how different mitigations and countermeasures affect these exposures; for example, we find that disabling remote logins by local accounts and implementing protections that prevent the caching of credentials on remote hosts can substantially curtail lateral movement and privilege escalation.

READ FULL TEXT
research
05/01/2023

How effective is multifactor authentication at deterring cyberattacks?

This study investigates the effectiveness of multifactor authentication ...
research
09/21/2020

Adversary Models for Mobile Device Authentication

Mobile device authentication has been a highly active research topic for...
research
12/07/2020

Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions

Authentication based on keystroke dynamics is a convenient biometric app...
research
06/27/2022

FIDO2 With Two Displays-Or How to Protect Security-Critical Web Transactions Against Malware Attacks

With the rise of attacks on online accounts in the past years, more and ...
research
07/16/2015

Deep Learning and Music Adversaries

An adversary is essentially an algorithm intent on making a classificati...
research
08/05/2021

Role-based lateral movement detection with unsupervised learning

Adversarial lateral movement via compromised accounts remains difficult ...
research
09/19/2019

Detecting malicious logins as graph anomalies

Authenticated lateral movement via compromised accounts is a common adve...

Please sign up or login with your details

Forgot password? Click here to reset